CVE Ape is a fairly simple, free and open source tool which helps to find all registered at the National Vulnerability Database (NVD) list of Common Vulnerabilities and Exposures (CVEs). The tool creates a local copy of NVD and CVEs databases and allows to search for registered CVEs by package name, vendor name or over OS libs and packages listed in the package list. Main usage of this tool is to help with review of Linux based IOT devices, but could be also integrated at the CI/CD pipelines to maintain a better level of security. This is not a very precise tool because it is not checking any backports nor vendors if not supplied specifically. The tool is downloading and creating a local CVE database at ~/.cache/cve-ape/ folder. It can be used offline, but only after a first update as it has to create a database.
FEATURES
ALTERNATIVES
Deliberately vulnerable web application for security professionals to practice attack techniques.
A collection of Ansible roles for hardening various systems and services
tfsec is being replaced by Trivy, a more comprehensive open-source security solution
Next-generation Linux exploit suggester with improved features for finding privilege escalation vulnerabilities.
Compares target's patch levels against Microsoft vulnerability database and detects missing patches.
Open source web application security scanner with 200+ vulnerability identification capabilities.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.